Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-26357

Опубликовано: 05 апр. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.2
CVSS3: 7

Описание

race in VT-d domain ID cleanup Xen domain IDs are up to 15 bits wide. VT-d hardware may allow for only less than 15 bits to hold a domain ID associating a physical device with a particular domain. Therefore internally Xen domain IDs are mapped to the smaller value range. The cleaning up of the housekeeping structures has a race, allowing for VT-d domain IDs to be leaked and flushes to be bypassed.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-infra-legacy/trusty

DNE

esm-infra/bionic

needs-triage

esm-infra/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
impish

ignored

end of life

Показывать по

EPSS

Процентиль: 1%
0.00013
Низкий

6.2 Medium

CVSS2

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
nvd
почти 4 года назад

race in VT-d domain ID cleanup Xen domain IDs are up to 15 bits wide. VT-d hardware may allow for only less than 15 bits to hold a domain ID associating a physical device with a particular domain. Therefore internally Xen domain IDs are mapped to the smaller value range. The cleaning up of the housekeeping structures has a race, allowing for VT-d domain IDs to be leaked and flushes to be bypassed.

CVSS3: 7
debian
почти 4 года назад

race in VT-d domain ID cleanup Xen domain IDs are up to 15 bits wide. ...

CVSS3: 7
github
почти 4 года назад

race in VT-d domain ID cleanup Xen domain IDs are up to 15 bits wide. VT-d hardware may allow for only less than 15 bits to hold a domain ID associating a physical device with a particular domain. Therefore internally Xen domain IDs are mapped to the smaller value range. The cleaning up of the housekeeping structures has a race, allowing for VT-d domain IDs to be leaked and flushes to be bypassed.

suse-cvrf
почти 4 года назад

Security update for xen

suse-cvrf
почти 4 года назад

Security update for xen

EPSS

Процентиль: 1%
0.00013
Низкий

6.2 Medium

CVSS2

7 High

CVSS3